Category: GBHackers
DDoS-as-a-Service botnets are used by hackers to facilitate the most easily and cheaply launch of devastating distributed denial-of-service (DDoS) attacks….
Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with…
Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide….
ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider…
Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from…
In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports,…
VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating…
eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign involving fake browser updates. This campaign has been responsible for…
CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to…
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability…
A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing…
Okta, a leading identity and access management company, has warned about credential stuffing attacks targeting its Customer Identity Cloud (CIC)….